A.DC2 B.DC3 C.DC4 D.DC5 E.DC6 F.Server1
单项选择题YouaredesigningaDHCPsolutiontomeetthebusinessandtechnicalrequirements.Whatshouldyoudo?()
A.Increase the default lease time on all DHCP servers. B.Split all address ranges across multiple DHCP servers. C.Configure duplicate scopes on at least two DHCP servers. D.Force client computers to obtain an IP address from Automatic Private IP Addressing (APIPA).
单项选择题YouaredesigningtheActiveDirectoryinfrastructuretomeetthebusinessandtechnicalrequirements.YourunADSizer,andfindthatitprovidesasolutionthatcontainsonlyonedomaincontrollerforAmsterdam.Whatshouldyoudo?()
A.Place at least two domain controllers in Amsterdam. B.Configure the domain controller as a bridgehead server. C.Configure the domain controller as a global catalog server. D.Distribute the users among sites in ADSizer and recalculate the number of domain controllers.
单项选择题YouaredesigningastrategytooptimizetheDNSnameresolutionforthesatelliteofficesthatconnecttothebranchofficesbyusingISDNlines.Whatshouldyoudo?()
A.Use caching-only DNS servers at these satellite offices. B.Configure a Hosts file for all client computers at these satellite offices. C.Configure a DNS server to use WINS forward lookup at these satellite offices. D.Place a DNS server with secondary zones of all domains at these satellite offices.
单项选择题Youaredesigningasitetopologytomeetthebusinessandtechnicalrequirements.Whatshouldyoudo?()
A.Increase the replication interval between sites. B.Use SMTP as the transport protocol for replication. C.Create site links to represent the physical topology. D.Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.
多项选择题YouaredesigningastrategyformigratingtheUNIXuseraccountstoActiveDirectory.Whichthreeactionsshouldyouperform?()
A.Import the user accounts as inetOrgPerson objects. B.Import the user accounts into Active Directory by using the Ldifde command-line tool. C.Export all user accounts from the UNIX servers to a text file. D.Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security. E.Assign random passwords to each user object, and securely distribute the password to the users. F.Create the same strong password for each user object, and require users to change their passwords at first logon.